US20060010490A1 - Backup method - Google Patents
Backup method Download PDFInfo
- Publication number
- US20060010490A1 US20060010490A1 US11/189,653 US18965305A US2006010490A1 US 20060010490 A1 US20060010490 A1 US 20060010490A1 US 18965305 A US18965305 A US 18965305A US 2006010490 A1 US2006010490 A1 US 2006010490A1
- Authority
- US
- United States
- Prior art keywords
- backup
- media
- security
- unique
- source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1456—Hardware arrangements for backup
Definitions
- the present invention relates to a method for backup of data files and so forth.
- Backup processing refers to copying all files in a backup source disk to a backup destination disk.
- the backup processing intends to copy all files in the backup source disk to the backup destination disk.
- the backup processing can be either processing of copying all files in the backup source to a specific folder of the backup destination, or difference backup processing in which the backup source is compared with the backup destination, unnecessary files in the backup destination are deleted, and files not present in the backup destination are copied.
- the above determination is possible, if it is authenticated based on password.
- the information for specifying the disk is not accessible at all. Therefore, in the state that the password is not authenticated, the backup source could not be corresponded to the backup destination.
- the backup method in the present invention is a backup method, which cannot manipulate data content without authentication based on password, comprising a step of storing a unique ID comprised in a security media ID of a backup source media in a security media ID of a backup destination media and a step of making correspondence between a backup destination media and a backup source media by verifying a unique ID of the backup source media comprised in a security media ID of the backup destination media and a unique ID of the backup source media comprised in a security media ID of the backup source.
- the backup source media can be readily corresponded to the backup destination media without password authentication.
- FIG. 1 is an overall view of the embodiment of the present invention
- FIG. 2 is a configuration diagram of the security MO disk
- FIG. 3 is a diagram showing structure of the secure ID
- FIG. 4 is a diagram showing a structure of the secure ID according to the embodiment of the present invention.
- FIG. 5 and FIG. 6 are diagrams showing other structures of the secure ID according to the embodiment of the present invention.
- FIG. 7 is a flowchart showing processing flow in backup according to the embodiment of the present invention.
- FIG. 8 is a flowchart showing generation procedure of the backup destination media
- FIG. 9 is a flowchart showing the processing flow in backup when using the specific ID
- FIG. 10 is a flowchart explaining generation procedures of the backup source media when using the specific ID
- FIG. 11 is a flowchart explaining generation procedures of the backup destination media when using the specific ID
- FIG. 12 is a flowchart explaining flow in backup in a case of a configuration using the specific ID and an identifier indicating the use of the present embodiment
- FIG. 13 is a flowchart showing generation procedures of the backup source media when using the specific ID and the identifier.
- FIG. 14 is a flowchart showing generation procedures of the backup destination media in the use of the specific ID and the identifier.
- FIG. 1 is an overall view of the embodiment of the present invention.
- 1 indicates a host PC
- 2 indicates a security MO drive
- 3 indicates a security MO disk of backup source
- 4 indicates a security MO disk of backup destination.
- a security MO security media
- a security disk and so forth refer to media etc., which requires authentication based on password in order for users to see the content of the stored data.
- FIG. 2 is a configuration diagram of the security MO disk.
- the security MO disk comprises security media ID (hereinafter referred to as a secure ID), password for authentication and normal data domain.
- the normal data domain by being formatted, reads and writes files originated from PC.
- the user In order to write the normal data domain in the security MO disk, the user must be authenticated based on one of four kinds of authentication passwords.
- Authentication passwords are a R/W password for reading/writing, a read password, which is read-only, an LBA password, which is accessible only from a section of the media, and an administrator password for allowing reference of the content of the media even when the user forgot the password.
- FIG. 3 is a diagram showing structure of the secure ID.
- the secure ID is 512-byte value, written in a disk by the security MO drive. Once the secure ID is written in, the value cannot be deleted or changed.
- a value automatically generated by the security MO drive is used for 64 bytes from the top. This is called a unique ID. Because the unique ID uses a serial number of the MO drive and a serial number of the security MO disk created in the drive, it is less likely to have unique ID sections overlapped between a plurality of security MO disks. For 448 bytes other than the unique ID, any value can be used depending on programs. This is called a user-defined ID. Even when the unique ID sections duplicate between a plurality of the security MO disks, uniqueness of the secure ID can be maintained as long as the user-defined IDs do not duplicate.
- creation timestamp is made for a value of 8 bytes in the user-defined ID. It can be said that uniqueness of 72-byte value, a combination of the unique ID of 8 bytes and 64 bytes, can be maintained. Also, the secure ID can be read out even if the user is not authenticated based on the authentication password.
- FIG. 4 is a diagram showing a structure of the secure ID according to the embodiment of the present invention.
- the secure ID of its own disk is written on other MO disk, and it is used as a security MO disk.
- the unique ID of the backup source is used for the 64 bytes of the user-defined ID. For example, as shown in FIG. 4 , the unique ID of the backup source is used for 64 bytes (64 bytes from the top of the user-defined ID) following the unique ID of the backup destination.
- the backup source ID used for the user-defined domain of the secure ID of the backup destination by adding a part of the user-defined ID to the backup source unique ID, the backup source can unfailingly correspond to the backup destination. For example, when using 72 bytes including the timestamp in the unique ID as shown in the above example, it can be realized by acquiring 72 bytes from the top of the backup source secure ID for the backup destination secure ID, and by using 72 bytes among the backup destination user-defined ID. With this method, maximum of 256 bytes of the backup secure ID can be used.
- FIG. 5 and FIG. 6 are diagrams showing other structures of the secure ID according to the embodiment of the present invention.
- the unique ID is written in automatically by the drive in setting of the secure ID; however, it can also be realized by writing a unique specific ID in a predetermined position of the user-defined domain when setting the secure ID, and then writing a specific ID of the backup source to a predetermined position of the user-defined domain of the backup destination.
- the specific ID GUID of Windows (registered trademark) etc. can be used.
- the backup destination disk When the backup source and the backup destination use the same position as the insertion position of the specific ID, by writing a backup destination identifier, for identifying the backup destination, in a predetermined position of the secure ID, the backup destination disk can be identified.
- the disk not using the present system can be distinguished.
- the disk not using the present system can be distinguished.
- the specific ID When using the specific ID, by writing position information and length information of the specific ID into a predetermined position of the secure ID, the specific ID can be arbitrarily set.
- the position information can be an offset from the top of the secure ID.
- the backup destination disk may have the specific IDs in two separate positions; however in such a case, the position information and the length information of both positions are written in the secure ID.
- FIG. 7 is a flowchart showing processing flow in backup according to the embodiment of the present invention.
- the backup source secure ID is acquired.
- the backup source secure ID (Src ID) is extracted, and in the step S 12 , the backup source disk is ejected from the security drive.
- a user inserts the backup destination into the security disk drive, and in the step 14 , the secure ID of the backup destination is acquired.
- a preset backup source unique ID (Trg ID) is extracted, and in the step S 16 the Src ID and the Trg ID are compared.
- the step S 17 whether the Src ID and the Trg ID correspond or not is determined. When they do not correspond to each other, the processing goes back to the step S 12 .
- step S 18 backup processing starts.
- the processing is terminated.
- the backup processing in this description is the same as in the regular backup processing of the secure disk, and the explanation is omitted, as it is conventional art.
- FIG. 8 is a flowchart showing generation procedures of the backup destination media.
- the backup source secure ID is acquired.
- the unique ID (Src ID) of the secure ID is extracted, and in the step S 22 , the backup source disk is ejected from the security disk drive.
- the user inserts media used as the backup destination into the security disk drive, and in the step S 24 , sets the backup destination secure ID. At that time, the Src ID is written in the user-defined domain of the secure ID, and the processing is terminated.
- FIG. 9 is a flowchart showing the processing flow in backup when using the specific ID.
- the backup source secure ID is acquired, in the step S 31 the specific ID (Src ID) of the secure ID is extracted, and in the step S 32 the backup source disk is ejected.
- the step S 33 the user inserts the backup destination disk, in the step S 34 the backup destination secure ID is acquired, in the step S 35 a preset backup source specific ID (Trg ID) is extracted from the backup destination secure ID, and in the step S 36 the Src ID and the Trg ID are compared with each other.
- step S 37 when they did not correspond, the processing goes back to the step S 32 , whereas, when they correspond in the step S 37 , in the step S 38 , the backup processing starts, and when the backup processing is completed, the whole processing is terminated.
- FIG. 10 is a flowchart explaining generation procedures of the backup source media when the specific ID is used.
- step S 40 media, which a user uses as the backup source is inserted in the security disk drive.
- step S 41 the backup source secure ID is set. At that time, the Src ID is written in the user-defined domain of the secure ID, and the processing terminates.
- FIG. 11 is a flowchart explaining generation procedures of the backup destination media when the specific ID is used.
- the backup source secure ID is acquired.
- the specific ID (Src ID) of the secure ID is extracted.
- backup source disk is ejected, and in the step S 48 , a user inserts the media used as the backup destination.
- the backup destination secure ID is set, and Src ID is written in the user-defined domain of the secure ID.
- FIG. 12 is a flowchart explaining flow of backup in a case of a configuration using the specific ID and an identifier indicating the use of the present embodiment.
- the backup source secure ID is acquired.
- the identifier indicates the use of the system of the embodiment of the present invention (whether a system identifier is accurate and a method identifier is for the specific ID or not) is determined.
- the processing terminates.
- the determination in the step S 51 is NO, the processing terminates.
- the determination in the step S 51 is YES, in the step S 52 , the specific ID (Src ID) of the secure ID is extracted, and in the step S 53 , the backup source disk is ejected from the security disk drive.
- a user inserts the backup destination into the security disk drive, and in the step S 55 , the backup destination secure ID is acquired.
- step S 56 whether or not the identifier of the backup destination secure ID indicates the use of the system of the embodiment of the present invention (whether a system identifier is accurate and a method identifier is for the specific ID or not) is determined.
- the processing terminates.
- the determination of the step S 56 is NO, the processing terminates.
- a preset backup source specific ID (Trg ID) is extracted, and in the step S 58 , the Src ID and the Trg ID are compared to each other.
- step S 59 correspondence in these IDs are determined, and when they do not correspond, the processing goes back to the step S 53 , whereas when they correspond, in the step S 60 , the backup processing is started. When the backup processing is completed, the processing terminates.
- FIG. 13 is a flowchart showing generation procedure of the backup source media when using the specific ID and the identifier.
- step S 65 a user inserts media used as the backup source into the security disk drive.
- step S 66 the backup source secure ID is set. At that time, the Src ID, the method identifier and the system identifier are written into the user-defined domain of the secure ID, and the processing terminates.
- FIG. 14 is a flowchart showing generation procedures of the backup destination media in the use of the specific ID and the identifier.
- the backup source secure ID is acquired, in the step S 71 , the specific ID (Src ID) of the secure ID is extracted, and in the step S 72 , the disk is ejected from the security disk drive.
- the user inserts media used as the backup destination into the security disk drive, and in the step S 74 , the backup destination secure ID is set. At that time, after writing the Src ID, the method identifier and system identifier into the user-defined domain of the secure ID, the processing terminates.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2003/007037 WO2004109520A1 (ja) | 2003-06-03 | 2003-06-03 | バックアップ方法 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/007037 Continuation WO2004109520A1 (ja) | 2003-06-03 | 2003-06-03 | バックアップ方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060010490A1 true US20060010490A1 (en) | 2006-01-12 |
Family
ID=33495913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/189,653 Abandoned US20060010490A1 (en) | 2003-06-03 | 2005-07-26 | Backup method |
Country Status (4)
Country | Link |
---|---|
US (1) | US20060010490A1 (ja) |
JP (1) | JP4252997B2 (ja) |
CN (1) | CN1745368A (ja) |
WO (1) | WO2004109520A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130159643A1 (en) * | 2011-12-19 | 2013-06-20 | International Business Machines Corporation | Detecting tampering of data during media migration, and storage device |
US20150081994A1 (en) * | 2013-09-13 | 2015-03-19 | VMware,Inc | Incremental backups using retired snapshots |
US9772907B2 (en) | 2013-09-13 | 2017-09-26 | Vmware, Inc. | Incremental backups using retired snapshots |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020071567A1 (en) * | 2000-12-12 | 2002-06-13 | Kurn David Michael | Scalable computer system using remote agents to manipulate cryptographic keys |
US20020095399A1 (en) * | 2000-08-04 | 2002-07-18 | Devine Robert L.S. | System and methods providing automatic distributed data retrieval, analysis and reporting services |
US20040123127A1 (en) * | 2002-12-18 | 2004-06-24 | M-Systems Flash Disk Pioneers, Ltd. | System and method for securing portable data |
US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07287655A (ja) * | 1994-04-18 | 1995-10-31 | Ricoh Co Ltd | 情報処理装置 |
JPH0816481A (ja) * | 1994-06-30 | 1996-01-19 | Nec Field Service Ltd | 外部記憶媒体の情報保護システム |
JPH11249967A (ja) * | 1998-02-27 | 1999-09-17 | Fanuc Ltd | Ncデータの不正複写防止方法 |
JP2001014221A (ja) * | 1999-04-27 | 2001-01-19 | Victor Co Of Japan Ltd | コンテンツ情報記録方法及びコンテンツ情報記録装置 |
JP2001022859A (ja) * | 1999-04-27 | 2001-01-26 | Victor Co Of Japan Ltd | コンテンツ情報記録方法、コンテンツ情報記録装置、コンテンツ情報記録再生方法、コンテンツ情報記録再生装置、及びメディア |
JP3389186B2 (ja) * | 1999-04-27 | 2003-03-24 | 松下電器産業株式会社 | 半導体メモリカード及び読み出し装置 |
JP2001243106A (ja) * | 2000-02-28 | 2001-09-07 | Ricoh Co Ltd | 記録媒体及びそのアクセス制御方法 |
JP4012664B2 (ja) * | 2000-04-11 | 2007-11-21 | 株式会社リコー | 記録媒体及びそのアクセス制御方法 |
JP2002312249A (ja) * | 2001-04-12 | 2002-10-25 | Yamaha Corp | コンテンツ再生装置のバックアップ方法およびバックアップ用記憶メディア |
-
2003
- 2003-06-03 JP JP2005500536A patent/JP4252997B2/ja not_active Expired - Fee Related
- 2003-06-03 CN CNA038260115A patent/CN1745368A/zh active Pending
- 2003-06-03 WO PCT/JP2003/007037 patent/WO2004109520A1/ja active Application Filing
-
2005
- 2005-07-26 US US11/189,653 patent/US20060010490A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020095399A1 (en) * | 2000-08-04 | 2002-07-18 | Devine Robert L.S. | System and methods providing automatic distributed data retrieval, analysis and reporting services |
US20020071567A1 (en) * | 2000-12-12 | 2002-06-13 | Kurn David Michael | Scalable computer system using remote agents to manipulate cryptographic keys |
US20040123127A1 (en) * | 2002-12-18 | 2004-06-24 | M-Systems Flash Disk Pioneers, Ltd. | System and method for securing portable data |
US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130159643A1 (en) * | 2011-12-19 | 2013-06-20 | International Business Machines Corporation | Detecting tampering of data during media migration, and storage device |
US10303593B2 (en) * | 2011-12-19 | 2019-05-28 | International Business Machines Corporation | Detecting tampering of data during media migration, and storage device |
US20150081994A1 (en) * | 2013-09-13 | 2015-03-19 | VMware,Inc | Incremental backups using retired snapshots |
US9514002B2 (en) * | 2013-09-13 | 2016-12-06 | Vmware, Inc. | Incremental backups using retired snapshots |
US9772907B2 (en) | 2013-09-13 | 2017-09-26 | Vmware, Inc. | Incremental backups using retired snapshots |
Also Published As
Publication number | Publication date |
---|---|
JP4252997B2 (ja) | 2009-04-08 |
CN1745368A (zh) | 2006-03-08 |
JPWO2004109520A1 (ja) | 2006-07-20 |
WO2004109520A1 (ja) | 2004-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7124301B1 (en) | Data protection method for a removable storage medium and a storage device using the same | |
JP2006228203A (ja) | ストレージボリュームのデータ正常性を保証する方法 | |
USRE44969E1 (en) | Storage media with benchmark representative of data originally stored thereon | |
US7725673B2 (en) | Storage apparatus for preventing falsification of data | |
US20060200414A1 (en) | Methods of copy protecting software stored on portable memory | |
JP2013506910A (ja) | ライトワンスリードメニー(worm)メモリデバイスの認証およびセキュアリング | |
US20060123483A1 (en) | Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media | |
JP2008035397A (ja) | 暗号情報処理方法および暗号情報処理装置 | |
JP4696052B2 (ja) | 記憶装置、記憶媒体、制御装置、メモリ、サーバ装置、サーバクライアントシステム | |
TW200416540A (en) | Entry point for digital rights management data | |
US20060010490A1 (en) | Backup method | |
US20080226082A1 (en) | Systems and methods for secure data backup | |
US20020138747A1 (en) | Restricted data access | |
US20060039554A1 (en) | High security media encryption | |
JP4012664B2 (ja) | 記録媒体及びそのアクセス制御方法 | |
JP2000132459A (ja) | データ保存システム | |
US7092949B2 (en) | Recording medium having a plurality of sections storing root directory information | |
GB2323951A (en) | Password processing | |
JPWO2002041317A1 (ja) | セキュリティ媒体作成方法、セキュリティ媒体作成装置及び再生装置 | |
JP4352601B2 (ja) | データ改竄チェック方法および装置、ならびに、記録媒体 | |
US20060259975A1 (en) | Method and system for protecting digital media from illegal copying | |
KR101265691B1 (ko) | 저장 장치의 식별자 관리 방법, 복원 방법 및 그 장치 | |
JP4030524B2 (ja) | 可換記憶媒体のデータ保存方法及び、これを適用した記憶装置 | |
US7624285B2 (en) | Method and device for protecting user information against manipulations | |
JP2001035092A (ja) | リムーバブルメモリ、リムーバブルメモリドライブ及びセキュリティ管理方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJITSU LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MAKITA, SATOSHI;REEL/FRAME:016819/0512 Effective date: 20050606 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |